Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "threat detection"
Google Cloud
Skills you'll gain: Exploratory Data Analysis, Feature Engineering, Real Time Data, Google Cloud Platform, MLOps (Machine Learning Operations), Data Analysis, Applied Machine Learning, Continuous Monitoring, Predictive Modeling, Data Warehousing, Machine Learning
- Status: NewStatus: Preview
Coursera Instructor Network
Skills you'll gain: Data Cleansing, Generative AI, Business Process Automation, Workflow Management, Scalability, Data Quality, Artificial Intelligence, Data Transformation, OpenAI, Automation, Data Ethics, Alteryx, Maintainability, Tensorflow, Data Validation, Performance Improvement
- Status: Preview
Coursera Instructor Network
Skills you'll gain: Oracle Cloud, Cloud Security, Threat Detection, Continuous Monitoring, Encryption, Cloud Infrastructure, Infrastructure Security, Network Security, Infrastructure As A Service (IaaS), Cloud Computing, Threat Management, Data Encryption Standard, Identity and Access Management, Data Security, Firewall, Key Management
Google Cloud
Skills you'll gain: Cloud Security, Infrastructure Security, Cloud Infrastructure, Kubernetes, Google Cloud Platform, Cloud Computing, Threat Management
Skills you'll gain: Cloud Security, Threat Detection, Google Cloud Platform, Threat Management, Cloud Computing, Intrusion Detection and Prevention, Network Security, Firewall, Security Information and Event Management (SIEM), Incident Response, Endpoint Security
Coursera Project Network
Skills you'll gain: Competitive Analysis, Customer Analysis, Market Analysis, Business Strategy, Market Share, Market Dynamics, Strategic Planning, Supplier Management, New Business Development, Leadership, Entrepreneurship
Skills you'll gain: Google Cloud Platform, Intrusion Detection and Prevention, Network Monitoring, Network Security, Virtual Machines, Security Information and Event Management (SIEM), Cloud Infrastructure, General Networking, Threat Detection, Network Infrastructure, Load Balancing, System Configuration, Network Analysis
- Status: New
Kennesaw State University
Skills you'll gain: Endpoint Security, Cyber Security Policies, Cybersecurity, Threat Detection, Cyber Attacks, Security Awareness, Computer Security Awareness Training, Remote Access Systems, Telecommuting, Human Factors (Security), Mobile Security, Malware Protection, Incident Response, Email Security, Virtual Private Networks (VPN)
Skills you'll gain: Open Web Application Security Project (OWASP), Vulnerability Assessments, Application Programming Interface (API), API Design, Secure Coding, Vulnerability Management, Threat Modeling, Application Security, Authentications, Authorization (Computing), Server Side, Encryption, SQL
Skills you'll gain: Unit Testing, Google Cloud Platform, Software Documentation, Collaborative Software, Software Development Tools, Technical Documentation, Code Review, Maintainability, Application Development
- Status: Preview
IIT Roorkee
Skills you'll gain: Unsupervised Learning, Anomaly Detection, Supervised Learning, Data Mining, Machine Learning Algorithms, Deep Learning, Data Science, Python Programming, Artificial Neural Networks, Exploratory Data Analysis, Internet Of Things, Probability & Statistics, NumPy, Real Time Data, Regression Analysis
- Status: NewStatus: Free Trial
Skills you'll gain: Network Troubleshooting, Network Administration, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, General Networking, Technical Support and Services, Hardening, Network Infrastructure, Network Protocols, Intrusion Detection and Prevention, Threat Modeling, Identity and Access Management, Authentications, Virtual Local Area Network (VLAN), Encryption, Key Management
Searches related to threat detection
In summary, here are 10 of our most popular threat detection courses
- Data Analysis with the FraudFinder Workshop:Â Google Cloud
- Smart Data Cleaning with Generative AI:Â Coursera Instructor Network
- Demystifying Oracle Cloud Infrastructure (OCI) Security:Â Coursera Instructor Network
- Securing Google Cloud Compute with Prisma Cloud:Â Google Cloud
- Enhanced Network Security Approach on Google Cloud:Â Google Cloud
- Using Porter’s Five Forces Model for Competitive Analysis : Coursera Project Network
- Google Cloud Packet Mirroring with OpenSource IDS:Â Google Cloud
- An Employee's Guide to Cybersecurity:Â Kennesaw State University
- A Detailed Guide to the OWASP Top 10:Â Packt
- Streamline App Development with Gemini Code Assist:Â Google Cloud